Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 02:52

General

  • Target

    f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe

  • Size

    254KB

  • MD5

    f993316983e77de72f4b1c69b2f55096

  • SHA1

    37b2d0b7712fe734364f063feb7281ee9a90dda7

  • SHA256

    7beb18eb319097646049e624f9a4ff02976a8cd917603fe22d7f481616b3e91b

  • SHA512

    1ba86ace045bbeb795de66527327d89f82778f4760ebf0241ddf22f3260187fdb4194d1c4760984e964df450712bf48c767027b5d680998269bfbf59cc9bcde9

  • SSDEEP

    3072:j6b3Y3Fv+f02rtGxj4OwmKy+fv7IkRYMLW+mAXrRt8x6o7Piv2Piv2Piv2Piv:jsI1mztGSH7I8YMLx32ppp

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\dplaysvr.exe
      "C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of UnmapMainImage
      PID:2108
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A489.tmp

          Filesize

          70KB

          MD5

          64d2472358ebc2d3678cfaa13ae0d864

          SHA1

          e7ca16f6aa793ad7d2e94d7a3a08d28b77534b4e

          SHA256

          33d203ad0a2a3265820f9e36b27f3041f6f8a89cc913512e6749f073b6952dfd

          SHA512

          7a583bddd39ee2d2b96a3de260c48182dcc97c26a6ef6e21181ca7113e76a3d46d31fe3845a13fed2df216362abbd1f5b94d120a29e34464394327d485f8cd00

        • C:\Users\Admin\AppData\Local\Temp\A48A.tmp

          Filesize

          35KB

          MD5

          37dcc8fccef1e4fba055f66e41358074

          SHA1

          27bf55f851d9f85fdcbc8aa1a4c0b10bf2a25d03

          SHA256

          d702e77b2348cc50067f0896e0e6117b54cf7f1d79268b81171e51f5ead0665f

          SHA512

          aee124411f19ccd2f825bf61ad4332ee7b5366a881e1bd95bbee424ca6bd299744839a8bc3f28d79401f1eaca81d6423212bf8a35443aec40338fd95008a6371

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          884B

          MD5

          53c2b14b258594b29d3d8aa172e93e66

          SHA1

          bec86a56ce8280abfb196a725db751c3be36c554

          SHA256

          2c7c7f676a02b7b09b66e3be5c99e22b59f14955c5eaa0c12ba3b4d80d527015

          SHA512

          2ecf62675d5c74d681010beb65a55555266ad067dde01ae57ec3db0d551df9d8160c50d2b6f9a6a0f44a7bea9ed6744dc95e69ebadfb4b35f46191ef1cfabaa7

        • memory/2056-4-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2056-3-0x0000000000220000-0x0000000000269000-memory.dmp

          Filesize

          292KB

        • memory/2056-21-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2056-26-0x0000000000400000-0x0000000000449000-memory.dmp

          Filesize

          292KB

        • memory/2108-24-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2108-23-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2108-25-0x0000000001B80000-0x0000000001B93000-memory.dmp

          Filesize

          76KB